• About communications
  • Current Issue
  • Digital Edition
  • Sample Issue
  • FAQs
  • Author Center
  • Author Guidelines
  • ACM Copyright Form
  • ACM Copyright Policy
  • ACM Author Rights
  • Submit a Video
  • Editor's Letters
  • Third-Party Material
  • Kudos Service
  • 2016 Editorial Calendar
  • Editorial Board
  • Editor's Letters
  • Editorial Staff
  • Contact Us
  • Mobile Apps
  • For Advertisers
  • Research Archive


    Latest Research Research Archive 2020JulyJuneMayAprilMarchFebruaryJanuary2019DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2018DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2017DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2016DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2015DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2014DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2013DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2012DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2011DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2010DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2009DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2008DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary Refine your search:
    Archives

    The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

    July 2020


    From Communications of the ACM

    Spectre Attacks: Exploiting Speculative Execution

    Spectre Attacks

    This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim's process.

    Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom | July 2020

    From Communications of the ACM

    Technical Perspective: Why 'Correct' Computers Can Leak Your Information

    "Spectre Attacks: Exploiting Speculative Execution," by Paul Kocher, et al., reviews how speculative execution and caches can be exploited, presents specific exploits using speculative branches that are direct and indirect, and…

    Mark D. Hill | July 2020

    From Communications of the ACM

    Technical Perspective: ASIC Clouds: Specializing the Datacenter

    Can we build purpose-built, warehouse-scale datacenters customized for large-scale arrays of ASIC accelerators or, to use a term coined in the paper by Michael Bedford Taylor, et al., ASIC clouds?

    Parthasarathy Ranganathan | July 2020

    From Communications of the ACM

    ASIC Clouds: Specializing the Datacenter for Planet-Scale Applications

    ASIC Clouds

    This paper distills lessons from Bitcoin ASIC Clouds and applies them to other large scale workloads, showing superior TCO (total cost of ownership) versus CPU and GPU.

    Michael Bedford Taylor, Luis Vega, Moein Khazraee, Ikuo Magaki, Scott Davidson, Dustin Richmond | July 2020